Social media privacy is an important issue, one that will
remain relevant as social media platforms continue to grow and privacy settings
lack transparency. Most individuals fall
into one of three general categories: those that give social media privacy no
thought and post without much concern; those that give it some thought but
proceed with caution; and those that give it a lot of thought and proceed with
great care. As with all things, there
are gradations to the above social media privacy spectrum. Regardless, there comes a point in time where
you need to make a decision to join the social media rank, or not, and if so, to
what extent.
Social media related privacy risks are tremendous. Given that we are in the infancy of social
media, it will be a matter of time before the real implications are fully
understood. “Some of Facebook's research on user behavior found that
71% of people drafted at least one post that they never posted” (Jayson,
2014). The mere fact that there is data
out there mining what we don’t post
is enlightening – and a bit alarming. Additionally, I am even more
concerned for children growing up in an age where social media is the norm and
the long term implications are unknown.
I take a conservative approach in my privacy settings in all
social media platforms I use. It is important to read privacy statements before signing
up for a social media account but most don’t take the time to read the fine
print. When you do, it can be very
enlightening. “For instance, when Facebook
recently announced changes to its
default privacy settings on sharing with friends, it revealed that it
could access smartphone mics to capture and analyze the songs, TV shows, and
other things users heard” (Baskin, 2014).
This is an important detail, yet it is largely unknown to the average
Facebook user.
The Privacy Rights
Clearinghouse suggests that an individual “become familiar with the
privacy settings available on any social network you use.” Most social media sites do not make it easy to read their
privacy statements nor is it always easy to find the privacy statement. “This is muddled communicating, at best, and it’s hard
not to think that it’s purposeful, since the profitability of these services depends on users
remaining unaware of the extent to which their privacy is (or will be)
exploited” (Baskin, 2014).
The growing fear factor
has made me very discerning about which social media platforms I use and what
content I post. “Your every online move
leaves cyber footprints that are rapidly becoming fodder for research without
you ever realizing it” (Jayson, 2014). I
had privacy concerns while signing up for required social media sites for COMI 610. Some have panned out, others were
unnecessary, but mostly the bigger privacy issues remain uncertain. What I now know to be true is that “these new
media giants are recording, dissecting, and distributing a running log of our
lives” (Schaefer, 2012).
Check out this Jack Vale social media experiment video showing just how easy it is to gather information about individuals (and freak them out in the process):
References
Baskin, J. (2014, May 28). Privacy Issues Could
Threaten The Future Of Commercial Social Media. Retrieved February 25, 2015,
from
http://www.forbes.com/sites/jonathansalembaskin/2014/05/28/privacy-issues-could-threaten-the-future-of-commercial-social-media/
Jayson, S. (2014, March 12). Social media
research raises privacy and ethics issues. Retrieved February 25, 2015, from http://www.usatoday.com/story/news/nation/2014/03/08/data-online-behavior-research/5781447/
Privacy Rights Clearinghouse. (2015, February
1). Fact Sheet 35: Social Networking Privacy: How to be Safe, Secure and
Social. Retrieved February 25, 2015, from
https://www.privacyrights.org/social-networking-privacy-how-be-safe-secure-and-social
Schaefer, M. (2012). Controversy and Turmoil. In Return On Influence (1st ed., p. 128). McGraw-Hill.
Vale, J. (2013, November 18). Social Media
Experiment. Retrieved February 25, 215, from
https://www.youtube.com/watch?v=5P_0s1TYpJU

Very interesting post, Kim. I would have to agree with your privacy assessment of social media. Admittedly, I rarely read (or comprehend) privacy statements - the updates are too frequent (and I'm not a lawyer)! Although, I am cautious when applying privacy settings and I take note of who is attempting to friend, link, or follow me.
ReplyDeleteWhile I do choose to participate, to a degree, on social media, I am very concerned about the future, especially for personal use. However, I rarely hear concerns for privacy of information on the behalf of businesses. Do you think there is a risk for businesses to participate on social sites? There is a huge push for corporations, especially B2B, to engage online with consumers, yet at what cost to the corporation or industry?
Look forward to the discussion!
Catherine,
DeleteThat's a really good point. I believe the same issues that apply to our personal privacy concerns apply to businesses, as well. At the rate that data is mined, I can only imagine that it is only a matter of time before that information is sold just the same way our personal information is sold. Perhaps we don't hear as much about corporate privacy issues given the fact that people are more concerned with their personal information and that issue takes center stage? I can only imagine the vastness of the information that will be accessible from a business perspective - the opportunities will be endless and the downside is still unknown.
Kim
Agreed! Imagine the information that could be bought and sold, or worse yet, tampered with from a corporation's perspective.
DeleteThe need for all online participants to manage the information that is shared is outstanding. Hopefully, participants start to second guess what they are sharing, and consider if the benefit to sharing outweighs the risk. I see a future with all new sorts of corporate scandals!
Through popular social networking sites, public attention previously only known to celebrities is now part of the user's virtual world. Recommendations from employers, photos, geotags of places visited, and other user generated content are open for comments from the public or other members of the user’s social network. With an email address, phone number, or name anyone can visit a people search engine such as Spokeo and view a portrait of an individual’s digital identity. The social network user’s second self is projected through their reviews of retailers on yelp!, their psychological profile on eHarmony, and their pins on the Trip Advisor map. When viewed as a whole the individual may appear to have multiple personalities as each online social network represents the opportunity to create a discrete online persona suited for a particular group. (Hongladarom. 2011)
DeleteHongladarom S. (2011) Personal identity, the self and the online world. Minds and Machines 21(4), pp 533-548 (5-8)
As social media continues to evolve and mobile technology becomes permits users to perform more activities on the go I think applications like Bump will become more popular. There is a scene in the movie Minority Report where as people walk through a corridor the ads are targeted directly to their interest. This is already happening on a certain level as Facebook and Google suggest ads related to the content of your posts, searches, and email. My concern for the future of personal branding in light of the technology mentioned above is that the information could be made amiable to potential employers or clients. Just as you can Bump to collect all a person’s contact information could there come a day when you walk into a meeting with a mobile device and everyone present instantly knows everything Google knows about you? If that is the case there will no longer be a point in finely crafting online profiles, controlling security settings, and selecting the right networks—your brand will be truly you not what you wish to project.
ReplyDeleteNow that is a scary thought, Yana!
DeleteInteresting points, Yana, and as Catherine mentioned - scary as well!
DeleteKimberly,
ReplyDeleteI agree with your breakdown of the 3 categories of people where privacy is concerned. Although until this class I aimed to also be conservative in my personal social media use, but can see the advantages on creating that online brand with it comes to a business purpose. Although there are the existing privacy settings that we can all aim to better adhere too, the everyday person is doubtfully as tech skillful as the people who are looking to gather or steal personal information.
Hi Kelly, I think you are right, individuals can monitor their personal brand better, however I don't think it is as easy as we say. It is very difficult to mange a personal brand, as well as manage the privacy that comes along with it.
DeleteDo you have any suggestions to managing out personal brand?
Kimberly, I posted my initial reply to you and Yana several days ago, can you check your spam folder please.I can re-post if needed.
ReplyDeleteHi Kelly, I just checked and there is nothing in the spam folder. Kim
ReplyDeleteThere are no spam comments - that the message copy/paste message from the spam folder. Kim
DeleteKimberly,
ReplyDeleteFantastic video! This simple video is very effective at illustrating just how much personal information we put out there via our social media interaction. Although in small pieces it may not appear as much or as anything that could cause privacy concerns, but the accumulation of it all clearly shows all the pieces fitting together to formulate a full profile on someone. All it takes is for the wrong person to target someone and put in the efforts to gathering these small pieces. Although social media usage has become an obsession for our culture, and the peer pressure socially and professional to be involved is immense, I believe it is still a choice. We choose to participate, and then we choose how much to share, therefore we each have a personal responsibility to protect our self, but also be mindful of the things we share about others. StaySafeOnline.org provides a few simple tips to remember with social networking sites. “Once posted, always posted. Keep personal info personal. Protect Yourself with these STOP. THINK. CONNECT.” If we are using the internet we need to understand that it isn’t private, even as much as we can help make it more secure someone can always obtain even deleted information. Also mentioned is “Privacy and security settings exist for a reason,” they are there for us to use, to protect ourselves, because with developing technology comes associated risk, and is partnered with people looking to misuse it. I understand that our online brand or persona is very important to our modern global culture, however protecting our identity should be more important. As humans our identity is what helps formulate society, helps to provide boundaries, and guidelines to our life. Therefore, we should have respect for it, and we shouldn’t be s careless with it.
Kelly Apfel
References:
StaySafeOnline.org, Social Networks
https://www.staysafeonline.org/stay-safe-online/protect-your-personal-information/social-networks